Tamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Batool, Komal Niazi, Muaz A |
description | Networks are important storage data structures now used to store personal
information of individuals around the globe. With the advent of personal genome
sequencing, networks are going to be used to store personal genomic sequencing
of people. In contrast to social media networks, the importance of
relationships in this genomic network is extremely significant. Losing
connections between individuals thus implies losing relationship information
(E.g. father or son etc.). There currently exists a considerably serious
problem in the current approach to storing network data. Simply stated, network
data is not tamper-evident. In other words, if some links or nodes were
changed/removed/added by a malicious attacker, it would be impossible for the
administrator to detect such changes. While, in the current age of social media
networks, change in node characteristics and links can be bad in terms of
relationships, in the case of networks for storing personal genomes, the
results could be truly devastating. Here we present a scheme for building
tamper-evident networks using a combination of Cryptographic and Ego-based
Network analytic methods. Using actual published data-sets, we also demonstrate
the utility and validity of the scheme besides demonstrating its working in
various possible scenarios of usage. Results from the extensive experiments
demonstrate the validity of the proposed approach. |
doi_str_mv | 10.48550/arxiv.1708.05926 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1708_05926</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1708_05926</sourcerecordid><originalsourceid>FETCH-LOGICAL-a676-8761d34a737364deca6bba10fa35717c54dcfa695255367602d3f4410d6de1853</originalsourceid><addsrcrecordid>eNotzr0OgjAYheEuDga9ACfZnMCW9mtxNAR_EqILO_mkJWm0QqpBvXsVnc70njyEzBiNRQpAl-ifto-ZomlMYZXIMVmU6Drjo7y32lzvYda67mKe4dZcW2fr8GDuj9afbxMyavByM9P_BqTc5GW2i4rjdp-tiwilklGqJNNcoOKKS6FNjfJ0QkYb5KCYqkHoukG5ggSAfwKaaN4IwaiW2rAUeEDmv9tBWnXeOvSv6iuuBjF_A20DOeY</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Tamper-Evident Complex Genomic Networks</title><source>arXiv.org</source><creator>Batool, Komal ; Niazi, Muaz A</creator><creatorcontrib>Batool, Komal ; Niazi, Muaz A</creatorcontrib><description>Networks are important storage data structures now used to store personal
information of individuals around the globe. With the advent of personal genome
sequencing, networks are going to be used to store personal genomic sequencing
of people. In contrast to social media networks, the importance of
relationships in this genomic network is extremely significant. Losing
connections between individuals thus implies losing relationship information
(E.g. father or son etc.). There currently exists a considerably serious
problem in the current approach to storing network data. Simply stated, network
data is not tamper-evident. In other words, if some links or nodes were
changed/removed/added by a malicious attacker, it would be impossible for the
administrator to detect such changes. While, in the current age of social media
networks, change in node characteristics and links can be bad in terms of
relationships, in the case of networks for storing personal genomes, the
results could be truly devastating. Here we present a scheme for building
tamper-evident networks using a combination of Cryptographic and Ego-based
Network analytic methods. Using actual published data-sets, we also demonstrate
the utility and validity of the scheme besides demonstrating its working in
various possible scenarios of usage. Results from the extensive experiments
demonstrate the validity of the proposed approach.</description><identifier>DOI: 10.48550/arxiv.1708.05926</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Databases ; Computer Science - Networking and Internet Architecture ; Computer Science - Social and Information Networks</subject><creationdate>2017-08</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,778,883</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1708.05926$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1708.05926$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Batool, Komal</creatorcontrib><creatorcontrib>Niazi, Muaz A</creatorcontrib><title>Tamper-Evident Complex Genomic Networks</title><description>Networks are important storage data structures now used to store personal
information of individuals around the globe. With the advent of personal genome
sequencing, networks are going to be used to store personal genomic sequencing
of people. In contrast to social media networks, the importance of
relationships in this genomic network is extremely significant. Losing
connections between individuals thus implies losing relationship information
(E.g. father or son etc.). There currently exists a considerably serious
problem in the current approach to storing network data. Simply stated, network
data is not tamper-evident. In other words, if some links or nodes were
changed/removed/added by a malicious attacker, it would be impossible for the
administrator to detect such changes. While, in the current age of social media
networks, change in node characteristics and links can be bad in terms of
relationships, in the case of networks for storing personal genomes, the
results could be truly devastating. Here we present a scheme for building
tamper-evident networks using a combination of Cryptographic and Ego-based
Network analytic methods. Using actual published data-sets, we also demonstrate
the utility and validity of the scheme besides demonstrating its working in
various possible scenarios of usage. Results from the extensive experiments
demonstrate the validity of the proposed approach.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Databases</subject><subject>Computer Science - Networking and Internet Architecture</subject><subject>Computer Science - Social and Information Networks</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzr0OgjAYheEuDga9ACfZnMCW9mtxNAR_EqILO_mkJWm0QqpBvXsVnc70njyEzBiNRQpAl-ifto-ZomlMYZXIMVmU6Drjo7y32lzvYda67mKe4dZcW2fr8GDuj9afbxMyavByM9P_BqTc5GW2i4rjdp-tiwilklGqJNNcoOKKS6FNjfJ0QkYb5KCYqkHoukG5ggSAfwKaaN4IwaiW2rAUeEDmv9tBWnXeOvSv6iuuBjF_A20DOeY</recordid><startdate>20170819</startdate><enddate>20170819</enddate><creator>Batool, Komal</creator><creator>Niazi, Muaz A</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20170819</creationdate><title>Tamper-Evident Complex Genomic Networks</title><author>Batool, Komal ; Niazi, Muaz A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a676-8761d34a737364deca6bba10fa35717c54dcfa695255367602d3f4410d6de1853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Databases</topic><topic>Computer Science - Networking and Internet Architecture</topic><topic>Computer Science - Social and Information Networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Batool, Komal</creatorcontrib><creatorcontrib>Niazi, Muaz A</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Batool, Komal</au><au>Niazi, Muaz A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Tamper-Evident Complex Genomic Networks</atitle><date>2017-08-19</date><risdate>2017</risdate><abstract>Networks are important storage data structures now used to store personal
information of individuals around the globe. With the advent of personal genome
sequencing, networks are going to be used to store personal genomic sequencing
of people. In contrast to social media networks, the importance of
relationships in this genomic network is extremely significant. Losing
connections between individuals thus implies losing relationship information
(E.g. father or son etc.). There currently exists a considerably serious
problem in the current approach to storing network data. Simply stated, network
data is not tamper-evident. In other words, if some links or nodes were
changed/removed/added by a malicious attacker, it would be impossible for the
administrator to detect such changes. While, in the current age of social media
networks, change in node characteristics and links can be bad in terms of
relationships, in the case of networks for storing personal genomes, the
results could be truly devastating. Here we present a scheme for building
tamper-evident networks using a combination of Cryptographic and Ego-based
Network analytic methods. Using actual published data-sets, we also demonstrate
the utility and validity of the scheme besides demonstrating its working in
various possible scenarios of usage. Results from the extensive experiments
demonstrate the validity of the proposed approach.</abstract><doi>10.48550/arxiv.1708.05926</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1708.05926 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1708_05926 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Databases Computer Science - Networking and Internet Architecture Computer Science - Social and Information Networks |
title | Tamper-Evident Complex Genomic Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T14%3A15%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Tamper-Evident%20Complex%20Genomic%20Networks&rft.au=Batool,%20Komal&rft.date=2017-08-19&rft_id=info:doi/10.48550/arxiv.1708.05926&rft_dat=%3Carxiv_GOX%3E1708_05926%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |